Dimitrios Papadopoulos
Dimitrios Papadopoulos
Verified email at - Homepage
Cited by
Cited by
Secureboost: A lossless federated learning framework
K Cheng, T Fan, Y Jin, Y Liu, T Chen, D Papadopoulos, Q Yang
IEEE Intelligent Systems 36 (6), 87-98, 2021
New constructions for forward and backward private symmetric searchable encryption
J Ghareh Chamani, D Papadopoulos, C Papamanthou, R Jalili
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou
Proceeding of IEEE Symposium on Security and Privacy (S&P), 2017
Dynamic searchable encryption with small client storage
I Demertzis, JG Chamani, D Papadopoulos, C Papamanthou
NDSS 2020, 2020
{SEAL}: Attack mitigation for encrypted databases via adjustable leakage
I Demertzis, D Papadopoulos, C Papamanthou, S Shintre
29th USENIX security symposium (USENIX Security 20), 2433-2450, 2020
Searchable encryption with optimal locality: Achieving sublogarithmic read efficiency
I Demertzis, D Papadopoulos, C Papamanthou
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
{TRUESET}: Faster {Verifiable} Set Computations
AE Kosba, D Papadopoulos, C Papamanthou, MF Sayed, E Shi, ...
23rd USENIX Security Symposium (USENIX Security 14), 765-780, 2014
vRAM: Faster verifiable RAM with program-independent preprocessing
Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou
Proceeding of IEEE Symposium on Security and Privacy (S&P), 2018
NSEC5: Provably Preventing DNSSEC Zone Enumeration
S Goldberg, M Naor, D Papadopoulos, VS Reyzin, Leonid, A Ziv
NDSS, 2015
Verifiable Set Operations over Outsourced Databases
R Canetti, O Paneth, D Papadopoulos, N Triandopoulos
Public Key Cryptography 2014, 113-130, 2014
A zero-knowledge version of vSQL
Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou
Cryptology ePrint Archive, 2017
Bitextract: Interactive visualization for extracting bitcoin exchange intelligence
X Yue, X Shu, X Zhu, X Du, Z Yu, D Papadopoulos, S Liu
IEEE transactions on visualization and computer graphics 25 (1), 162-171, 2018
Transparency logs via append-only authenticated dictionaries
A Tomescu, V Bhupatiraju, D Papadopoulos, C Papamanthou, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Privacy in decentralized cryptocurrencies
D Genkin, D Papadopoulos, C Papamanthou
Communications of the ACM 61 (6), 78-88, 2018
Verifiable random functions (VRFs)
S Goldberg, L Reyzin, D Papadopoulos, J Vcelák
IETF in-ternet draft, 2018
Agora: A privacy-aware data marketplace
V Koutsos, D Papadopoulos, D Chatzopoulos, S Tarkoma, P Hui
IEEE Transactions on Dependable and Secure Computing 19 (6), 3728-3740, 2021
Taking Authenticated Range Queries to Arbitrary Dimensions
D Papadopoulos, S Papadopoulos, N Triandopoulos
ACM Conference on Computer and Communications Security 2014, 819-830, 2014
Making NSEC5 practical for DNSSEC
D Papadopoulos, D Wessels, S Huque, M Naor, J Včelák, L Reyzin, ...
Cryptology ePrint Archive, 2017
Zero-knowledge accumulators and set algebra
E Ghosh, O Ohrimenko, D Papadopoulos, R Tamassia, N Triandopoulos
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
This website uses nudging: Mturk workers' behaviour on cookie consent notices
C Bermejo Fernandez, D Chatzopoulos, D Papadopoulos, P Hui
Proceedings of the ACM on human-computer interaction 5 (CSCW2), 1-22, 2021
The system can't perform the operation now. Try again later.
Articles 1–20